1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
7

Protocols at which layer of the OSI model have the primary function of moving datagrams through an internetwork connected by rou

ters?
Computers and Technology
1 answer:
Vladimir [108]3 years ago
5 0

Answer:

"Network layer" is the correct answer to the given question .  

Explanation:

The network layer is interconnected with different networks by providing permission to the network. This job is done by sending the packets in the network. The main aim of the network layer is to provide the logical addressing, routing, and fragmentation of packets.

The network layer is the layer of the OSI model whose primary function is moving the packets or datagrams in the internetwork which is connected by the routers.  

You might be interested in
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
Dafna1 [17]
An outline can be a best tool to begin describes a presentation....
4 0
4 years ago
Read 2 more answers
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
write up a performance review for a fellow employee. Imagine you work in a shop and this is a fellow salesperson on the shop flo
son4ous [18]

Answer:

I'd give him the lowest performance review because who knows what he does, I mean, he is on the floor, not doing anything, especially not working.

8 0
3 years ago
A ______ oversees the planning and implementation of sophisticated security measures to block unauthorized access but at the sam
meriva
A-database administrator
8 0
3 years ago
A field value is currently not in any group. what happens when you try adding it to an existing group?
ivann1987 [24]

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

<h3>What is a  field value?</h3>

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at brainly.com/question/843074

#SPJ1

6 0
1 year ago
Other questions:
  • On a pie chart, the different sections or "wedges" show:
    9·1 answer
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy t
    12·1 answer
  • Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between cu
    12·1 answer
  • Addison, Inc. uses a perpetual inventory system. Below is information about one inventory item for the month of September. Use t
    15·1 answer
  • The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
    14·1 answer
  • Which file extension would be used to indicate a webpage document?.
    12·1 answer
  • Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
    13·1 answer
  • Combining data and code in a single object is known as
    7·1 answer
  • The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the se
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!